IT Security Best Practice
All colleagues are urged to be extra vigilant and follow IT security best practice
Following Russia’s attack on Ukraine, the cyber security threat level has been heightened.
One of the most common attempts to breach cyber defences is through the use of phishing emails, so it is really important that you remain alert to suspicious emails containing links or attachments. Please take the time to read the simple best practice guide below and follow the links at the bottom for more information and guidance.
Do not open any suspicious links or attachmentsPhishing is when hackers and criminals send illegitimate but very realistic-looking emails to try and trick people into clicking attachments or links to begin a cyber attack. To avoid phishing:
|
|
Use strong passphrasesThe easiest way to protect yourself from cyber threats is by having a strong passphrase. This is a sentence-like string of words that is longer than a traditional password but is easier to remember and more difficult to break such as a quote or a line from a song. It should include:
|
|
Use encryption to send personal, confidential or sensitive informationWhere personal, confidential or sensitive information is to be sent via email, the content of the email MUST be secured using an encrypted method of transfer. It is policy that emails containing any Personal Confidential Data (PCD) or commercially sensitive information should be sent using an NHSmail account. |
|
Fully restart your computer every couple of days or at least once a week to install updatesIT security updates are regularly scheduled for your computer to ensure your device, and the systems you have access to, remain compliant with the latest security recommendations. |
|
Beware of social engineeringSocial engineering involves criminals using tricks or deception to manipulate people into giving access to information such as patient data, health care records or details of IT systems. Giving unauthorised or suspicious people access to information or places could risk someone taking patient data. A social engineer might use the following tactics:
To help stop social engineering:
|
|
Watch out for tailgatersTailgating is when unauthorised people gain entry to a building by following a staff member through physical security facilities, such as doors, barriers and gates, to avoid detection. Letting unauthorised people in could lead to them taking patient data or accessing systems. To help stop tailgating:
|
|
Further information and supportFor further information on the risks to look out for as well as handy hints and tips on how to be cyber savvy, please visit: |